CVE-2005-3591

Macromedia Flash plugin (1) Flash.ocx 7.0.19.0 (Windows) and earlier and (2) libflashplayer.so before 7.0.25.0 (Unix) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via parameters to the ActionDefineFunction ActionScript call in a SWF file, which causes an improper memory access condition, a different vulnerability than CVE-2005-2628.
References
Link Resource
http://marc.info/?l=bugtraq&m=113140426614670&w=2
http://secunia.com/advisories/17430/ Patch Vendor Advisory
http://secunia.com/advisories/17437/ Vendor Advisory
http://secunia.com/advisories/17481/ Vendor Advisory
http://secunia.com/advisories/17626/ Vendor Advisory
http://secunia.com/advisories/17738/ Vendor Advisory
http://securityreason.com/securityalert/149
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html Vendor Advisory
http://www.microsoft.com/technet/security/advisory/910550.mspx Vendor Advisory
http://www.sec-consult.com/226.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/15334 Exploit Patch
http://www.vupen.com/english/advisories/2005/2317 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23022
http://marc.info/?l=bugtraq&m=113140426614670&w=2
http://secunia.com/advisories/17430/ Patch Vendor Advisory
http://secunia.com/advisories/17437/ Vendor Advisory
http://secunia.com/advisories/17481/ Vendor Advisory
http://secunia.com/advisories/17626/ Vendor Advisory
http://secunia.com/advisories/17738/ Vendor Advisory
http://securityreason.com/securityalert/149
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html Vendor Advisory
http://www.microsoft.com/technet/security/advisory/910550.mspx Vendor Advisory
http://www.sec-consult.com/226.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/15334 Exploit Patch
http://www.vupen.com/english/advisories/2005/2317 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/23022
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0_r19:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=113140426614670&w=2 - () http://marc.info/?l=bugtraq&m=113140426614670&w=2 -
References () http://secunia.com/advisories/17430/ - Patch, Vendor Advisory () http://secunia.com/advisories/17430/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17437/ - Vendor Advisory () http://secunia.com/advisories/17437/ - Vendor Advisory
References () http://secunia.com/advisories/17481/ - Vendor Advisory () http://secunia.com/advisories/17481/ - Vendor Advisory
References () http://secunia.com/advisories/17626/ - Vendor Advisory () http://secunia.com/advisories/17626/ - Vendor Advisory
References () http://secunia.com/advisories/17738/ - Vendor Advisory () http://secunia.com/advisories/17738/ - Vendor Advisory
References () http://securityreason.com/securityalert/149 - () http://securityreason.com/securityalert/149 -
References () http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html - Vendor Advisory () http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html - Vendor Advisory
References () http://www.microsoft.com/technet/security/advisory/910550.mspx - Vendor Advisory () http://www.microsoft.com/technet/security/advisory/910550.mspx - Vendor Advisory
References () http://www.sec-consult.com/226.html - Exploit, Patch, Vendor Advisory () http://www.sec-consult.com/226.html - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/15334 - Exploit, Patch () http://www.securityfocus.com/bid/15334 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2005/2317 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2317 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23022 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23022 -

Information

Published : 2005-11-16 07:42

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3591

Mitre link : CVE-2005-3591

CVE.ORG link : CVE-2005-3591


JSON object : View

Products Affected

macromedia

  • flash_player
CWE
CWE-20

Improper Input Validation